H04W12/66

LOCAL IMS SELECTION FOR TRUSTED NETWORK OPERATORS
20210176634 · 2021-06-10 ·

A first carrier may support inbound roaming requests for subscribers of a trusted second carrier. For example, the first carrier may receive an inbound roaming request from a UE. The first carrier may determine a second carrier that is a home carrier of the UE is a trusted carrier associated with the first carrier. In response, an IMS procedure associated with the UE may be performed including communicating, by a first CSCF node of the first carrier, with a first HSS of the second carrier, using a same protocol as used by the first CSCF node to communicate with a second HSS of the first carrier and communicating, by the first CSCF node, with a first AS of the second carrier, using a same protocol as used by the first CSCF node to communicate with a second AS of the first carrier.

METHOD AND APPARATUS FOR OPTICAL ENCRYPTION COMMUNICATION USING A MULTITUDE OF HARDWARE CONFIGURATIONS
20210176064 · 2021-06-10 · ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

CENTRAL TRUST HUB FOR INTERCONNECTIVITY DEVICE REGISTRATION AND DATA PROVENANCE
20210194860 · 2021-06-24 ·

Apparatus and method for device and data authentication in a computer network, such as but not limited to an IoT (Internet of Things) network. In some embodiments, a trust hub device is coupled to an interconnectivity device. The trust hub device includes a controller and non-volatile memory (NVM), and may be a network capable data storage device. The interconnectivity device is configured as an Internet of Things (IoT) or Operational Technology (OT) device, and includes a controller and a sensor. Data from the sensor are transferred from the interconnectivity device to the trust hub device. The trust hub device proceeds to attest a provenance of the data from the sensor to a remote entity associated with the interconnectivity device. The trust hub device includes a firewall to the external network, establishes a root of trust for the local interconnectivity device, and performs enrollment and signing services for the interconnectivity device.

COMMUNICATION METHODS AND DEVICES IN INTELLIGENT TRANSPORT SYSTEMS
20210160323 · 2021-05-27 ·

According to some embodiments, there is provided a Collective Perception Message, CPM, characterizing a plurality of Vulnerable Road Users based on a plurality of received VAMs, thereby allowing an ITS station to efficiently aggregate VAM messages from VRUs and retransmit information about the VRUs to other ITS stations. Consequently, the security is improved as some ITS stations may not be able to detect or identify VRU stations by themselves but thanks to the CPM, these stations can still be informed of the VRUs. According to other aspects, congestion is avoided while maintaining safety vis-à-vis VRUs thanks to the use of a different transmission scheme when the VRU is already characterized in a CPM sent to the ITS stations. Also, a receiving station can evaluate whether the content of a CPM can be trusted or not. Safety is thus improved. This is achieved thanks to the CPM that references a certificate.

MULTI-DOMAIN TRUST ESTABLISHMENT IN EDGE CLOUD ARCHITECTURES

A service coordinating entity device includes communications circuitry to communicate with a first access network, processing circuitry, and a memory device. The processing circuitry is to perform operations to, in response to a request for establishing a connection with a user equipment (UE) in a second access network, retrieve a first Trusted Level Agreement (TLA) including trust attributes associated with the first access network. One or more exchanges of the trust attributes of the first TLA and trust attributes of a second TLA associated with the second access network are performed using a computing service executing on the service coordinating entity. A common TLA with trust attributes associated with communications between the first and second access networks is generated based on the exchanges. Data traffic is routed from the first access network to the UE in the second access network based on the trust attributes of the common TLA.

BLOCKCHAIN-BASED PRIVACY TRANSACTION AND BLOCKCHAIN-BASED PRIVACY TRANSACTION APPLICATION METHODS AND APPARATUSES
20210150521 · 2021-05-20 · ·

A blockchain-based privacy transaction computer-implemented method, medium, and system are disclosed. In one computer-implemented method, a first message sent by a first blockchain user of a blockchain is received by a node device of a trusted user of the blockchain. The trusted user is trusted by the first blockchain user and is determined by a trust setting transaction stored in a distributed database of the blockchain. The trust setting transaction includes identifiers of all trusted users associated with the first blockchain user, and the first message includes privacy-unprotected first data information. The privacy-unprotected first data information is converted by the node device into privacy-protected second data information. The privacy-unprotected first data information is stored in a local database of the node device of the trusted user. A second transaction including the privacy-protected second data information is sent by the node device to the blockchain. The second transaction is stored in the distributed database of the blockchain after the second transaction is verified by the blockchain.

Source verification device

Systems and methods for source verification are disclosed. A method includes: receiving, by a computing device, a report from a first source; determining, by the computing device, the first source is listed in a source repository based on receiving the report; selecting, by the computing device, a second source at a location remote from the first source based on the source being listed in the source repository; confirming, by the computing device, the report from the first source based on information received from the second source; repeating, by the computing device, the selecting and the confirming until a value of information in the report from the second source exceeds an information trust level value for the report.

Secure communication for machine to machine connections

Systems, methods, and software can be used to improve the security for machine to machine communications. In some aspects, a method is disclosed comprising: receiving, at a vehicle, a connection request from an electronic device; receiving, at the vehicle, security posture information from the electronic device, wherein the security posture information comprises at least one of operating system update information or antivirus status information; and determining, by the vehicle, whether to connect to the electronic device based on the security posture information of the electronic device.

Voice-based time-sensitive task processing over a high generation cellular network

Aspects of the disclosure relate to voice-based time-sensitive task processing over a high generation cellular network. A computing platform may establish a communication channel with a computing device. The computing platform may authenticate a user of the computing device, where the user is authorized to access the enterprise server. Then, the computing platform may detect, via the communication interface, a voice-based interaction from the authenticated user. The computing platform may cause the voice-based interaction to be captured as audio data. Subsequently, the computing platform may transform the audio data to textual data. The computing platform may analyze the textual data to identify a time-sensitive task related to an entity. Then, the computing platform may generate, based on the identified time-sensitive task, one or more instructions to execute the time-sensitive task. Subsequently, the computing platform may send, to an enterprise server, the one or more instructions to execute the time-sensitive task.

METHODS AND SYSTEMS FOR ACCESSING A NETWORK
20210168143 · 2021-06-03 · ·

A method of accessing a network comprises providing, via a first container establishing a first tunnel between a computing device and a network server, a health-check status of the computing device to the network server, and accessing, via a second container establishing a second tunnel between the computing device and the network server, the network at a level of access based on the health-check status of the computing device.